You are on page 1of 8

IDEAS. INFLUENCE. IMPACT.

IssueBrief
Jason Healey CYBER STATECRAFT INITIATIVE

Beyond Attribution: Seeking National


Responsibility for Cyber Attacks
For more than two decades, cyber defenders, intelligence
analysts, and policymakers have struggled to determine About the Cyber Statecraft Initiative
the source of the most damaging attacks. This “attribution
The Atlantic Council’s Cyber Statecraft Initiative helps
problem” will only become more critical as we move into
foster international cooperation and understanding of
a new era of cyber conflict with even more attacks
new forms of cooperation and conflict in cyberspace
ignored, encouraged, supported, or conducted by
through global engagement and thought leadership.
national governments.
This is an edited version of a paper that first appeared
Analysts often fall into the trap of “attribution fixation,” the
in the Brown Journal of World Affairs.
belief that they cannot assess which organization or nation
was behind an attack until technical forensics discovers the This paper was made possible by generous support
identity of the attacking machines. Because the Internet by Saab North America, Inc.
enables anonymity more than security, this bottom-up
process rarely succeeds.
United States embassy in Beijing (among other embassies
Fortunately, there is another option. and consulates), smashing windows with stones and tearing

For national security policymakers, knowing “who is to up nearby roads to use as more projectiles. Yet the US

blame?” can be more important than “who did it?” Moreover, intelligence community and National Security Council staff

attribution becomes far more tractable when approached as did not spend much time watching video to backtrack

a top-down policy issue with nations held responsible for trajectories in order to identify the individual stone throwers.

major attacks originating from their territory or conducted by There was no need to indulge in litho-ballistic forensics

their citizens. because exact attribution was not an important input for
decision-makers.
Meeting the needs of policymakers must be the end goal of
attribution, not a byproduct. So, in addition to making the Policymakers knew that to reduce these Chinese

case for national responsibility for cyber attacks, this paper government-encouraged stone-throwing attacks, it needed

proposes a spectrum of state responsibility to more directly to coerce, engage, or assuage the Chinese government.

tie the goals of attribution to the needs of policymakers.1 Chinese police controlled the area but permitted the stone-
throwing; many protesters were transported by bus from
state-run universities in organized processions; and, to cap it
What Stones Teach Us
off, then-Vice President Hu Jintao made state support explicit
In 1999, NATO mistakenly bombed the Chinese embassy in in a televised statement. Knowing the identity of the stone
Belgrade during an airstrike to compel Yugoslavia to throwers would have provided thousands of data points,
withdraw forces from Kosovo. Furious Chinese targeted the but none that were relevant to decision-making.

1 In this paper, “attack” is used in its technical meaning, referencing a malicious cyber incident. The term here does not imply that the incident necessarily rises to
the level of “armed attack.”

Jason Healey is the Director of the Cyber Statecraft Initiative at the Atlantic Council of the United States. You can follow
his comments on cyber issues on Twitter at @Jason_Healey.
Eight years later, in an environment of emotional Russian
nationalism, cyber attacks inundated Estonia. Many of the The Spectrum of State Responsibility
attacks were traced to Russia, followed “instructions
1. State-prohibited. The national government will help
provided on Russian-language Internet forums and websites,”
stop the third-party attack
and were supported by comments from senior Russian
politicians. As with the Chinese government’s blind-eye for 2. State-prohibited-but-inadequate. The national
stone throwing, the Russian government refused to government is cooperative but unable to stop the
investigate or stop the attacks, leaving Russian police on third-party attack
the sidelines.
3. State-ignored. The national government knows
Despite these direct parallels between the Chinese and about the third-party attacks but is unwilling to take
Russian governments’ actions, too many analysts felt any official action
attribution fixation: the compulsion to comprehensively
4. State-encouraged. Third parties control and
backtrack the trajectory of the cyber-stones. Just as during
conduct the attack, but the national government
the China protests, the source of each individual attack
encourages them as a matter of policy
simply was not relevant to the most important decisions.
5. State-shaped. Third parties control and conduct the
In the case of Estonia, these analysts determined the attacks
attack, but the state provides some support
traced back to 178 countries, including the United States. But
so what? This mass of useless forensic facts resulted in only 6. State-coordinated. The national government
one prosecution and worse, served to muddy the obvious coordinates third-party attackers such as by
truth: the attacks were supported or encouraged by the “suggesting” operational details
Russian government and that to make the attacks stop, 7. S
 tate-ordered. The national government directs
Western decision-makers needed to engage Moscow. third-party proxies to conduct the attack on its behalf
This was self-evident when the projectiles were stones, but 8. State-rogue-conducted. Out-of-control elements
became somehow mystifying when the projectiles were of cyber forces of the national government conduct
electrons. Once reduced to this level, it is hopefully easier to the attack
recognize that stopping a state-encouraged attack need not
9. State-executed. The national government
depend on tracing every attack, but holding that government
conducts the attack using cyber forces under
responsible. But what does “responsibility” really mean in this
their direct control
context? To ask the question more broadly, in what ways is a
nation responsible for cyber attacks from its territory or 10. State-integrated. The national government attacks
conducted by its citizens? using integrated third-party proxies and government
cyber forces
The Spectrum of State Responsibility
The spectrum of state responsibility is a tool to help analysts Countries that fall into the first two categories have only very
with imperfect knowledge assign responsibility for a passive responsibility since they will, at the least, attempt to
particular attack, or campaign of attacks, with more precision cooperate with the nation under attack.
and transparency. This spectrum assigns ten categories,
each marked by a different degree of responsibility, based on State-prohibited. The national government will help stop

whether a nation ignores, abets, or conducts an attack. The the third-party attack, which may originate from its territory or

spectrum starts from a very passive responsibility—a nation merely be transiting through its networks. This responsibility

having insecure systems that lead to an attack—up to very is the most passive on the scale: though the government is

active responsibility—a national government actually planning cooperating, it still has some small share of responsibility for

and executing an attack. the insecure systems involved in the attack. In reality, nations
cannot ensure the proper behavior of the tens or hundreds of
millions of computers in their borders at all times.

2 At l antic C o unci l
State-prohibited-but-inadequate. The national State-ordered. The national government, as a matter of
government is cooperative and would stop the third-party policy, directs third-party proxies to conduct the attack on its
attack but is unable to do so. The country might lack the behalf. This is as “state-sponsored” as an attack can be,
proper laws, procedures, technical tools, or political will to without direct attack from government cyber forces. Any
use them. Though the nation could itself be a victim, it bears attackers that are under state control could be considered to
some passive responsibility for the attack, both for being be de facto agents of the state under international law.2
unable to stop it and for having insecure systems in the
State-rogue-conducted. Elements of cyber forces of the
first place.
national government conduct the attack. In this case,
In the following four categories, in contrast to the previous however, they carry out attacks without the knowledge, or
two, the nation is actively ignoring or abetting attacks: approval, of the national leadership, which may act to stop
the attacks should they learn of them. For example, local
State-ignored. The national government knows about the
units or junior officers could be taking the initiative to
third-party attacks but, as a matter of policy, is unwilling to
counterattack out of the senior officers’ sight. More
take any official action. A government may even agree with
worrisome, this category could include sophisticated and
the goals and results of the attackers and tip them off to
persistent attacks from large bureaucracies conducting
avoid being detected.
attacks that are at odds with the national leadership. Based
State-encouraged. Third parties control and conduct the on current precedence, a state could likely be held
attack, but the national government encourages them to responsible by international courts for such rogue attacks.
continue as a matter of policy. This encouragement could
State-executed. The national government, as a matter of
include editorials in state-run press or leadership publicly
policy, directly controls and conducts the attack using its own
agreeing with the goals of the attacks; members of
cyber forces.
government cyber offensive or intelligence organizations may
be encouraged to undertake supportive recreational hacking State-integrated. The national government integrates
while off duty. The nation is unlikely to be cooperative in any third-party attackers and government cyber forces, with
investigation and is likely to tip off the attackers. common command and control. Orders and coordination
may be formal or informal, but the government is in control of
State-shaped. Third parties control and conduct the attack,
selecting targets, timing, and tempo. The attackers are de
but the state provides some support, such as informal
facto agents of the state.
coordination between like-minded individuals in the
government and the attacking group. To further their policy The spectrum can be used both to describe individual
while retaining plausible deniability, the government may attacks or a campaign of related attacks, and is meant to be
encourage members of their cyber forces to undertake both for the operational cyber defenders (“General, this attack
“recreational hacking” while off duty. against us is probably state-ordered. If we ask that nation for
cooperation, they will not help us, and we will tip our hand.”)
State-coordinated. The national government coordinates
and the policy community (“The policy of our nation is to hold
the third-party attackers—usually out of public view—by
nations accountable for any state-ordered attacks as if those
“suggesting” targets, timing, or other operational details. The
attacks were coming from the uniformed military services.
government may also provide technical or tactical assistance.
You can’t hide behind proxies.”).
Similar to state-shaped attacks, the government may
encourage its cyber forces to engage in recreational hacking Any cyber campaign is likely to fit into one of these ten
during off hours. categories, depending on the mix of the three ways nations
are responsible for cyber attacks: they can ignore, abet, or
In the final four categories, the state, far from ignoring or
conduct attacks.
encouraging attacks, has a much more direct hand in them,
either ordering attacks or conducting them itself.

2 Being “de facto agents of the state” is a key element in legal analysis of responsibility for terrorism. A fair summary of existing international legal precedents is
that “states must direct or control—rather than simply support, encourage, or even condone—the private actor.” From Derek Jinks, “State Responsibility for the
Acts of Private Armed Groups,” Chicago Journal of International Law, Vol. 4 (2004).

At l antic C o unciL 3
“I’m shocked, shocked to find stone throwing!” Nations
are held responsible for ignoring attacks by refusing to
Unfortunately, the international
acknowledge the attack. (For example, by sidestepping
requests to investigate, by being unable to stop or investigate community generally treats
attacks coming from its cyber territory, or by having an cyber attacks as if every country were
insecure national information infrastructure.) Fostering an
Somalia: helpless to restrain attacks
environment in which attacks can occur is generally a passive
way for a nation to accumulate responsibility, compared to from its territory or mitigate their
abetting and conducting (see below). downstream impacts.
“Comrade, please throw these stones at that window.”
Nations are held responsible for abetting attacks by directly
or indirectly encouraging or supporting the attack. attacks. Piracy in the Strait of Malacca was reduced by 95
Encouragement ranges from the relatively benign (editorials percent when Singapore, Malaysia, and Indonesia
egging on the attacks) to the hostile (giving informal targeting recognized their dependence on trade and international trust
advice or even cash). and, setting aside regional differences, cooperatively
asserted their national power through patrolling, information
“Release the stones!” Nations are held responsible for
sharing, and other military collaboration, according to TIME
conducting attacks either by executing a decision made by
magazine. In an unconscious parallel to cyber security, one
the national government, or as a result of attacks carried out
observer summarized that, “It dawned on the states that
by elements of their government without official approval.
piracy is transnational and nothing that could be handled by
This is the most active responsibility a nation can have.
one nation alone […]. The sea doesn’t respect borders.”

“Cyber Somalia” and National Under international pressure, most nations could likewise
Responsibility for Cyber Attacks reduce attacks from their territory of cyberspace through
several well-established steps, including prioritizing security
In cyberspace, states do not and cannot have the same level
hiring, policies, and projects; pushing for improved security
of control as they do over their airspace or sovereign waters.
for computers in homes, universities, businesses, and
They will, however, have to take more responsibility to “shrink
governments; setting higher expectations for service
the sanctuaries” from where criminals act with impunity.
providers to identify and stop attacks; funding and training
Unfortunately, the international community places few effective incident response teams; and ensuring adequate
expectations on nations to reduce attacks originating from or resources for law enforcement and international cooperation.
routing through systems in their sovereign territory. This Nations that support hacking groups, for patriotic or
situation is similar to the low international expectations of a economic reasons, should feel pressure to rein them in—
range of “ungoverned spaces” across the world. For indeed, the Estonian national cyber strategy calls for efforts
example, the Somali government cannot police its own to “achieve worldwide moral condemnation of cyber attacks
territory, so the international community does not expect it to that affect the functioning of society and impinge directly on
patrol its offshore waters. Accordingly, the United States, people’s well-being.” All of these steps will establish that most
France, Japan, China, and other nations have stationed their nations are not as helpless as Somalia, and should meet
own fleets in the area (with permission to chase pirates into expectations to secure their cyberspace, cooperating with
Somali territorial waters) while shipping companies buy more others as necessary.
insurance and post mercenaries on their ships.
Saying that nations should be “responsible” for their part of
Unfortunately, the international community generally treats cyberspace is related to, but not quite the same thing as,
cyber attacks as if every country were Somalia: helpless to saying nations should have “sovereignty” over cyberspace.
restrain attacks from its territory or mitigate their downstream Sovereignty is a well-defined legal concept, and there is a
impacts. This, however, is not the only model for dealing with growing body of practice and scholarly articles on the
piracy, nor does it have to be the only model for cyber

4 At l antic C o unci l
application of national sovereignty in cyberspace.3 This Clinton was not making any specific sovereignty claims for
paper, however, is not advancing any such legal argument either the United States or China, but was instead setting the
about sovereignty. Rather, this paper argues that as a policy policy that China was responsible in settling this potential
(not legal) matter, nations can and should hold one another dispute between countries.
responsible to stop attacks and clean the cyber environment.
Similarly in Beijing in 2011, according to press, a senior State
While it is not official US policy to hold nations responsible for Department official “raised the case of a hacked US political
attacks from their territory or conducted by their citizens, the site directly with the Chinese Ministry of Foreign Affairs” while
International Strategy for Cyberspace from the White House in 2007, German Chancellor Angela Merkel complained to Hu
laid out what may be its future foundations: Jintao about Chinese intrusions into her own computer.

When warranted, the United States will respond to These cases clearly show that policymakers already are
hostile acts in cyberspace as we would to any other thinking in terms of national responsibility, not attribution.
threat to our country [and] recognize that certain hostile “Make this stop” is the common theme, not “who did it,”
acts conducted through cyberspace could compel and this national responsibility approach opens up the full
actions under the commitments we have with our range of coercive options that policymakers are already
military treaty partners. familiar with.

We reserve the right to use all necessary means— For example, if Estonia or another US friend or ally is attacked
diplomatic, informational, military, and economic—as again, the National Security Council should start by
appropriate and consistent with applicable international determining which head of state or government it
law, in order to defend our Nation, our allies, our recommends the president should call and what carrots and
partners, and our interests. sticks are available. The following conversation between the
president of the United States and the president of Russia is
Moreover, national responsibility falls in line with existing
entirely a thought experiment, to show what is possible
international agreements. As summarized by David Graham,
without exact attribution:
the United Nations General Assembly “has called upon
states to […] prevent their territories from being used as safe “We understand your assurance that Russia is not
havens [and] cooperate in the investigation and prosecution conducting these attacks against our treaty partner Estonia;
of international cyber attacks.” There has even been thank you for that affirmation and your promised investigation.
some existing state practice which will be the focus of However, we need these attacks to stop, and we look to
the next section. Russia for help.

First, I would like you and your prime minister to make clear
National Responsibility in Practice statements that these attacks need to stop. To date, your
The most important example of national responsibility for assurances have not been as clear as what you just made to
cyber attacks came in early 2010 after intrusions into the me. Second, an FBI team is assembling their gear and will be
networks of Google (a US company) became public and were airborne tomorrow, en route to Moscow to assist your
loosely traced back to China. Soon after, the US Department investigation. They will share all the forensic data we have
of State issued a démarche to the Chinese government and collected, and expect the same. They are already in touch
Secretary of State Hillary Clinton set the US government’s with your embassy here but we may need your help to ensure
expectations: “We look to Chinese authorities to conduct a they get visas immediately.
thorough investigation of the cyber intrusions that led Google
I am under intense international and domestic pressure for
to make this announcement […] We also look for that
action. Many in the public and press are not taking at face
investigation and its results to be transparent.” Secretary
value that your government is not involved. Every official

3 Beginning in earnest with French government pressure in 2000 against Yahoo! to prevent access in France to pro-Nazi material, a case well examined in: Who
Controls the Internet: Illusions of a Borderless World by Jack Goldsmith and John Wu; in particular, reference the writings of Sean Kanuck (“Sovereign Discourse
on Cyber Conflict” in the Texas Law Review, 2010), David Graham (“Cyber Threats and the Law of War” in the Journal of National Security Law and Policy,
2010), Patrick Franzese (“Sovereignty in Cyberspace” in Air Force Law Review, 2009). These authors all have general consensus around certain points, such as
(in Franzese’s words), “Many of the designers of cyberspace viewed it as an intellectual nirvana free from the constraints of the ‘real’ world. In reality, however,
cyberspace is part of the ‘real’ world and thus subject to its constraints and order—in other words, subject to state sovereignty.”

At l antic C o unciL 5
denial from the Russian government is matched by many I am sure some of these attacks will trace back to the United
more unofficial messages egging on the attacks. States and other countries and I pledge my government’s
help to stop them. May I count on you to do the same?”
Since the best way to convince these critics is for Russia to
cooperate, I will continue to hold them off as long as you and This thought experiment is of course not a foolproof way to
I are communicating and our joint investigation is progressing. stop future Estonia-style attacks and is meant only to show
My message remains that we should accept your personal what policy levers may be usable absent exact attribution.
assurances, backed by real cooperation. This approach displays four key advantages. First, it puts
policy front and center, not as a by-product or end-product of
attribution. Second, positive technical attribution does not

States on the receiving ends of even matter as the argument rests solely on holding a nation
accountable for attacks organized by its citizens or coming
continuing attacks must have recourse from its territory. Third, it re-establishes state-to-state

to the traditional full spectrum of symmetry. Even though the attacks may be undertaken by
non-state actors, this approach holds the offending
coercive policies. government responsible. Fourth, it is rooted in national
security fundamentals: one president signaling another about
unacceptable behavior. By decoupling the incident from any
technical jargon, the National Security Council staff and
However, if our dialog breaks down, the investigation meets
president will find it far easier to understand and engage their
roadblocks, or the Russian government continues to egg on
instincts, education, and experience.
the attackers, you force me to assume the worst. I’ll have no
choice but to believe that you have not been entirely truthful
and your government is encouraging, coordinating, or even Pitfalls of National Responsibility
participating in these attacks. Then, I of course will have to Holding nations responsible for attacks in this manner offers
change my message and agree that yes, we must assume more promise than a continuation of the current attribution
the Russian government is complicit in this cyber attack fixation. It does, however, bring some problems of its own.
on Estonia. First, like-minded nations need to join in multilateral
cooperation and collective defense, advocate for better
In this unfortunate event, I will recommend NATO immediately
security, and establish norms (the “rules of the road”) for
begin Article 4 consultations, deploy a rapid reaction team to
cyber cooperation, conflict, and competition. Second,
Estonia to assist their defense and start considering
accountability will be a double-edged sword: each nation will
thresholds for Article 5. Even if NATO ultimately does not act
need to lessen its own potential culpability by reducing its
in this matter, the United States will be prepared to act alone
population of infected machines and securing its systems. If it
to support our alliance partner. I have spoken to the
does not, that nation could itself be held responsible for
commanders of our cyber forces and, on their advice,
damage to nations on the receiving end of attacks from its
ordered them to a higher alert status. This will help us
cyber soil. The United States in particular will find itself in a
improve our own defense and speed planning to assist in the
difficult position: it is the country targeted by 65 percent of all
defense of our ally’s cyber territory, should I so order.
denial-of-service attacks (floods of traffic that disrupt normal
This should not be a surprise, as I made clear in my cyber operations of computers or networks), the most of any
strategy, the United States stands by our allies, even in country, according to cybersecurity company Symantec. The
cyberspace. While neither you nor I want such an outcome, I United States is also the top source for attacks, accounting
am confident the American people and the international for 22 percent of the global total. Essentially, United States is
community would support limited counteractions to blunt simultaneously both the prime victim of, and main sanctuary
the attacks. for, cyberattacks.

Third and most important, a push for national responsibility of


cyberspace could be manipulated by nations to clamp down

6 At l antic C o unci l
on an individual’s right to freedom of opinion and expression However, it is a conceptual move forward that is likely to be
“through any media and regardless of frontiers” as codified in picked up by other nations.
the 1948 Universal Declaration of Human Rights. Perhaps the
best example of this is the official agreement put forth by the Conclusion
Shanghai Cooperation Organization (SCO) comprised of
To rein in attacks raging across the Internet, the international
China, Russia, and central Asian nations. In a 2008
security community must focus on the needs of
declaration, the SCO expressed their worry about the “use of
policymakers, which is best served by looking to the
the dominant position in the information space to the
responsibility of nations. Too much time has been wasted
detriment of the interest and security of other States […] [and]
obsessing over which particular villain pressed the
dissemination of information harmful to social and political,
ENTER key.
social, and economic systems, as well as spiritual, moral, and
cultural spheres of other States.” These nations feel This paper accordingly introduced the spectrum of state
threatened by the flow of information from the United States, responsibility to shift the discussion away from “attribution
which is in the “dominant position in the information space.” fixation,” to national responsibility for attacks in cyberspace.
This type of information presumably includes hard news from The global national security community needs to shift
CNN and “harmful” information from Twitter or Facebook that resources from the technical attribution problem to solving
might cause a “moral” or “spiritual” impact such as the responsibility problem. This re-establishes state-to-state
questioning the legitimacy of the ruling party. symmetry and enables a wider range of options open to
sovereign nations: diplomatic, intelligence, military, and
To help counter such efforts (as well as recent Internet
economic responses. Nations cannot use these levers of
crackdowns in Egypt, Tunisia, and elsewhere as part of the
power against an individual stone-thrower, but can use them
“Arab Spring”) the United States has put “Internet freedom” at
against the nation that abets him. For countries that are
the center of both actions and public speeches. In fact,
willing to cooperate to reduce the numbers of insecure
Freedom House recently ranked the United States second for
systems, there should be offers of funding, training,
respect for Internet freedom in the world, just behind Estonia.
education, and access to technology. If a nation repeatedly
However, since the United States remains such a major
refuses to cooperate, states on the receiving ends of
source of global attacks, to improve credibility, some
continuing attacks must have recourse to the traditional full
government resources may need to shift to reducing the
spectrum of coercive policies, from démarches to sanctions
number of outbound attacks.
in the UN Security Council, prosecution in international
The Australian government has tried to address this balance courts, and all the way to covert action and kinetic
in their national security strategy by distinguishing cyber military force.
security (e.g., protecting confidentiality) from cyber safety
Cyberspace will be insecure until all nations are more
(stopping cyber stalking and bullying, protecting children from
responsible and restrictive of both inbound and outbound
pornography). Within the limits of the Universal Declaration of
attacks. Moving from “who threw that stone?” to “who is to
Human Rights, Australia is looking to intervene in the Internet
blame for stone throwing?” will be a crucial step to a more
and online behavior far more strongly than other countries.
stable and secure cyberspace.
Australia’s policy is still new, and whether making this
distinction will be in the overall interest of Australia’s citizens JANUARY 2012
and its neighbors in cyberspace is still an open question.

At l antic C o unciL 7
The Atlantic Council is a non-partisan organization that promotes constructive US leadership and
engagement in international affairs based on the central role of the Atlantic community in meeting
today’s global challenges.

© 2011 The Atlantic Council of the United States. All rights reserved. No part of this publication may be reproduced
or transmitted in any form or by any means without permission in writing from the Atlantic Council, except in the
case of brief quotations in news articles, critical articles, or reviews. Please direct inquiries to:

1101 15th Street, NW, Washington, DC 20005 (202) 463-7226


www.acus.org

8 At l antic C o unci l

You might also like